Time | Session | |
---|---|---|
08:00 - 09:00 | Breakfast & Registration | |
09:00 - 09:05 | Welcoming Remarks | |
09:05 - 09:15 | Opening Remarks by our 2018 Conference Co-Chairs
| |
09:15 - 09:45 | Morning Keynote Address A specialist in cyber warfare, Casey will speak to the global threat of nation state attacks and cyber warfare strategy. As a cyber and strategy advisor to The White House, Congress, government agencies, the military, and enterprise on cyber warfare – engaging with public-private partnerships globally – Casey will give practical guidance on knowing your cybersecurity adversaries: what are their intentions, strategy and tactics? What should you be thinking about to protect your company?
| |
09:45 - 10:30 | The Buyer’s Perspective A panel of senior risk managers will discuss the challenges they face in identifying and addressing the cyber risk exposures of their organisations. Insurance solutions will be evaluated, and panelists will share their insights into how well the insurance market is addressing their cyber risk needs.
| |
10:30 - 11:00 | Morning Break | |
Track 1 | Track 2 | |
11:00 - 12:30 | 11:00 – 11:30 Event Round-up This session will take a look at some recent cyber events, including Not-Petya and Equifax. What happened? How were they carried out? What should risk managers be concerned about for their organisations?
————————————– 11:30 -12:30 Protecting your Reputation: Responding to a Breach Using recent claims examples, this session will look at what makes a good response to a breach event and how you can change the course of events to manage a more successful response. Panelists will also dig into the availability of reputational harm cover in the insurance market: what does it cover?
| 11:00 – 11:30 Up Periscope: Underwriting Cyber Risk Given the inherent tension between simplifying the application process and the need for in-depth information, the need for better underwriting tools has never been greater. This panel will showcase some emerging technologies to measure and underwrite risks. What tools are underwriters using? How do you measure the effectiveness of the tools that are used?
————————————– 11:30 -12:30 The Cyber Hurricane: Quantifying Aggregation The concept of a Cyber Hurricane – a catastrophe event that could pose a balance sheet risk to insurers – has only recently become part of the cyber vernacular. Lloyd’s of London was ahead on this concept, and has developed Realistic Disaster Scenarios around cyber catastrophe. This session will outline the scenarios and explore the accumulation risks they are trying to gather. Panelists will also look at how carriers are identifying, measuring and reporting aggregation risks within their cyber portfolios. Panelists will outline how they are leveraging technology and big data to help them understand where their risk falls within these scenarios.
|
12:30 - 13:30 | Conference Luncheon | |
Track 1 | Track 2 | |
13:30 - 15:00 | 13:30 – 14:00 Selling the Board on Cyber Insurance This session will give top tips on how to construct a business case for cyber insurance within your organisation. Who is your audience and what traps should you avoid as you make a pitch for a cyber insurance purchase to your Board of Directors?
————————————– 14:00 – 14:30 Managing Third Party Cyber Risk: From Vendor to M&A Third party cyber risk confronts organisations within a continually evolving threat landscape. How are CISOs and risk managers able to assess and quantify the risks of third parties including vendors, supply chain participants and acquisition candidates? How do tools — including security ratings — assist in risk evaluation? How can organisations best communicate their initiatives to the insurance community?
————————————– 14:30 – 15:00 Best Foot Forward: Presenting your Company to the Insurance Market As you approach the insurance market to buy cyber insurance, how do you make your business and its cyber risk management stand out from the crowd? This session will prepare you for interactions with insurance market, offering practical tips on how to differentiate your cyber application to optimize your purchase.
| 13:30 – 14:30 Gaps & Overlaps Cyber perils are expanding at a rapid pace – and bleeding out of standalone cyber and into many other ‘traditional’ lines of business including property, crime, D&O. This session will address what cover is offered and where. Speakers will address where ‘silent cyber’ cover might be lurking.
————————————– 14:30 – 15:00 When Systems Stop Working: Measuring Business Interruption Exposures The increased reliance on technology within the connected economy has spawned new and more complex exposures. Identifying, measuring and managing Business Interruption and Contingent Business Interruption exposures has become a critical need. Leading providers will discuss the development of new techniques for measuring this exposure.
|
15:00 - 15:30 | Afternoon Break | |
15:30 - 16:00 | Afternoon Keynote Address
| |
16:00 - 17:00 | The Future of Cyber Insurance A panel of experts will talk about where the cyber product is going and how it will be structured.
| |
17:00 - 18:00 | Closing Remarks & Reception |
We consistently deliver an audience that is comprised of 20% Risk Managers & Insurance Buyers, Brokers (20%), Insurance Carriers (36%), Lawyers (6%), Service Providers (9%) and other insurance professionals (9%).
Get more information and submit your speaker proposal.